|Publication number||US8046304 B2|
|Application number||US 12/238,747|
|Publication date||Oct 25, 2011|
|Filing date||Sep 26, 2008|
|Priority date||Nov 2, 2007|
|Also published as||DE102007052458A1, EP2058769A1, EP2058769B1, US20090119219|
|Publication number||12238747, 238747, US 8046304 B2, US 8046304B2, US-B2-8046304, US8046304 B2, US8046304B2|
|Original Assignee||Francotyp-Postalia Gmbh|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (30), Referenced by (2), Classifications (9), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Invention
The present invention concerns a franking method and mail transport system with central postage accounting. The mail transport system is of the type having a data center of the postal carrier, a data center of an operator and at least one franking device. The postal carrier transports the mail pieces franked by the franking device to the mail sorting center. The purpose of the invention is to achieve a secure mail transport system with franking devices of simple design.
2. Description of the Prior Art
A simple solution that assumes either a personal computer (PC) with printer at the sender or a special franking device that is very simple to operate but that thereby requires neither an online connection for every franking nor a security module has previously been missing. Such an offline solution without security module is possible if the mail carrier conducts the postage determination and billing in the framework of its service provision. This means that a suitable software collects the required postage for the posting while the postings are read in the mail sorting center of the mail carrier and the destination address is determined. The software transmits a data set composed of sender and postage amount to the customer account administration of the mail carrier, which bills a customer account of the sender. The billing with the customer (sender) can ensue temporally decoupled from the accounting entry.
This method is called “central postage accounting” because the required postage values are centrally collected in the mail sorting centers of the mail carrier and not, as in the conventional, “decentralized postage accounting”, from the senders before commission to post offices or mail boxes.
Known from DE 38 40 041 A1 is an arrangement for franking of postal items with a franking device that prints a value imprint that is accounted by a computer of a central calculation point. This known franking device has a memory whose content is increased with each franking process and whose content can be read out by the user of the franking device. After a cover check, the computer is connected with a giro computer of the postal authority to bill the value imprint. The postal authority runs a mail giro account of the owner of the franking device. The giro computer releases every single value imprint after cover check and billing.
This means that the required postage for the posting is determined and paid before the postings are transported to the mail sorting center of the letter carrier and are read there along with the destination address. No retroactive payment of the service provided is provided in this mail transport system with central postage accounting.
In order to achieve the greatest possible security with regard to the postage accounting both for the mail carrier and for the user, the content of the memory (fashioned as units and sum memory) can be read out only by the user and by the computer of the charging location, and the connection of the computer of the charging location with the franking device is fashioned as a dedicated line (TEMEX) that is always in operation.
For small SOHOs (Small Office Home Office), no truly appropriate electronic franking solutions are yet on the market.
There are online solutions that assume a PC with printer at the sender and establish a data connection to the postage provider with every franking.
Furthermore, there are offline solutions that assume special franking devices with security module in which pre-paid postage values are administered in a manipulation-safe manner (Gerrit Bleumer: Electronic Postage Systems; Springer-Verlag, New York, 2007, Chapter 4.1 Basic Cryptographic Mechanisms, Page 91).
In postal markets worldwide it has been widespread to collect the postage fees decentrally at the input of the postal transport channel, for example via stamp sales or adoption of DV-cleared mailings in post offices and postal agents, via franking machines or franking service stations. For the sender, postage fees are due when the corresponding postage stamps are ordered or delivered, for example in the form of stamps, DV imprints and delivery lists, franking imprints in franking machines and PC franking solutions and franking services, etc.
To the extent that mail carriers transition to registering the processed mail entirely automatically for the purposes of address detection and additional services such as shipment tracking, the possibility results to also collect the due postage fees only upon processing in the mail sorting center. In this accounting model, customers do not have to pay any postage in advance; rather, they receive an invoice for their transported mailings at the end of the month, for example. If necessary, individual transport documentation can be ordered, similar to what is typical today for telecommunication invoices.
In the case of franking machines, this accounting model means that credit downloads are no longer necessary, rather the franking machine serves only to register the desired postal product and calculate and apply a corresponding franking imprint.
This accounting model is called “central postage accounting” in contrast to the previously typical “decentralized postage accounting”. Central postage accounting leads to a delayed payment request to the sender. Nevertheless, the designation “postpay” or “pay later” is not characteristic because in conventional, decentralized postage accounting the effective charging of the customer account can also in fact ensue later (for example via debiting methods or credit card payment) than the postal service is provided.
A system and a method for authentication of a mail sender who signs a mailing are known from U.S. Pat. No. 7,110,576. A handwritten signature represents a biometric identity of the sender which the sender applies to a mailing in that he performs a handwritten signature with the aid of a digitizer pen. A mail carrier subsequently scans the signature and can check from a central remote service whether the read signature is valid. The digitizer pen has also originally been registered at the remote service by means of signature tests. In a special design, the digitizer pen writes information into a radio frequency identity device (RFID), wherein the RFID tag is attached to the mailing. As a result of the check of the biometric feature for sufficient similarity of a biometric reference feature performed by the asserted sender, the mail carrier receives a response and attaches the result to the mailing insofar as said result is positive. A biometric sender recognition disadvantageously does not allow a unique device detection. No integrity checksum about the sender recognition is provided whatsoever. Moreover, it would be complicated to ensure that particular technical features such as, for example, an RFID tag are present in the mailing.
A system for identification of mailings by means of RFID is known from U.S. Pat. No. 6,801,833 B2. The mailings are bundled into stacks that are in turn combined in containers that are themselves transported in delivery trucks. Each container is equipped with its own RFID tag that lists all contained containers or mailings, such that every container and every mail piece can be automatically detected and tracked by a central computer at defined points of the mail transport path. The RFID tag can carry the following information features: addressee, sender, shipment ID, integrity checksum of a shipment ID, shipment value or encrypted shipment value. It thereby results that mailings are marked with unique sender identifiers, but in a different form and together with different features than those of the present invention. The sender can deliver a larger quantity of mailings in that he simultaneously provides one delivery list (mailing manifest). In manifest mailing systems, the sender does not determine the required postage amount, rather the delivery post office does this based on the mailing manifest. Therefore only one feature that produces a reference to the associated mailing manifest (permit imprint) must be applied to the individual mailings. In an atypical manner, an RFID tag is provided for this. A mailing ID uniquely identifies the mail piece, wherein the mailing ID can consist of the following parts: sender account number, date, tray ID, piece ID in mail tray, e-mail address of the sender, shipment value, shipment category and mail carrier. An error correction code (CRC) or a digital signature or a message authentication code (MAC) can be used for the identifiers of the mailings and all containers. The integrity checks should prevent that mailings are added to a wrong mail tray or are associated with an incorrect mail tray of an incorrect palette etc. due to technical errors (error correction code) or fraudulent manipulation (digital signature or message authentication code). Therefore an RFID tag must be applied to the individual mailings; however, given the number of senders it is difficult to ensure that the same conditions prevail for all. This is hardly possible when the sender attaches the RFID tag to the mail piece. A wrong adhesive can lead to the signal that an RFID tag detaches. For the sender it is not possible without further measures to read information from the RFID tag. A use of special devices at the sender would be necessary in order to store this information in the RFID tag.
A mail processing system with unique mail piece authorization that is assigned before the entrance of a mail piece into the processing flow of a mail transport service is known from U.S. Pat. No. 5,612,889. A unique shipment ID that serves as an index in a mailing manifest that contains the service address of all committed mailings is stamped on mailings. An address correction of the basis of the mailing manifests is thereby enabled. A commission of mailings is electronically recorded in advance at the mail carrier. For this the sender generates an electronic mailing manifest that he transmits to the mail carrier with cryptographic security. The letter carrier evaluates the information about the expected mailings and their addresses for service, corrects addresses if necessary and determines the required postage fees and subsequently bills the sender. The mail carrier returns a list of shipment IDs to the sender, who prints these on his mailings. The sender subsequently commits his mailings to the letter carrier. The mailing manifest is already present at the mail carrier at this point in time. The shipment ID alone does not designate a sender; rather, it is merely an index in a mailing manifest. This shipment ID only receives a meaning in connection with the mailing manifest. However, the shipment ID is not a unique identifier that can be used on all of the mailings of a franking device and can identify the sender.
From EP 710 930 B1, corresponding to U.S. Pat. No. 5,612,889, it is known to use a unique shipment ID that serves as an index in a mailing manifest that contains the addresses of service or destination ZIP codes of all committed mailings is imprinted on the mailings.
A method for mail good processing and a mail good processing system with hierarchical mail good processing is known from EP 1 058 212 A1, corresponding to U.S. Pat. No. 7,219,084. Private mail carriers that are regionally established relay mailings to super-regional mail carriers for their distribution outside of their region of operation. An identification of the sender ensues by means of a chip card that the customer of the private mail carrier bears and inserts into a card reader of the mail infeed system (mail box) when the customer surrenders the mail. It is provided that the customer receives a receipt for the mail placed in a mail box and initially to be supplied to a first carrier/location. The chip card serves as a customer card that already exhibits an identification number. Each mail good is provided with a machine-readable marking that consists of a number and additional shipping data specific to each mail good. The first carrier transports the mail from the mail infeed station (mail box) to the first location and there franks the letter with a franking imprint and conducts a debit from the customer account at a customer bank and commits the franked letter to a mail distribution center of a second carrier, which transports the mail further. A conventional franking is thus implemented and a conventional mailing manifest is generated after the marking of the mail good. The due postage amount is determined and collected while the mail goods are committed. The corresponding markings are applied to the mail goods in the same process. The marking can contain date and time of the commission and moreover an identification of the customer that has previously been imported from his customer card into the infeed station. This method can be designated as a “semi-central postage accounting”. Security checks in addition to the shipment identification and sender identification are not described.
Given decentralized postage accounting, pre-paid electronic money or credit is loaded into the franking device. If manipulation of these funds amount occurs, unpaid postal service can be accessed as a result. This can be difficult to detect by the harmed mail carrier and even more difficult to track back to the individual fraudulent party. The required expenditure via a hardware security module or an online data connection for franking which should prevent the fraudulent manipulations is disadvantageous.
An object of the present invention is to avoid these disadvantages and to provide a franking method and mail transport system with central postage accounting, wherein the security of the system is nevertheless guaranteed with the use of franking devices that are of simple design and user-friendly. The franking device should apply a manipulation-safe device identifier to the mail good.
Starting from the realization that a trust model is required that is different than in decentralized postage accounting, the security of the billing for franking devices is increased in spite of their simplified design. Centrally stored data can be better protected from falsification. Given central postage accounting, each franking device uses an individual device identifier that is embedded in all its franking imprints. Given registration of each franking device, the mail carrier associates its device identifier with an electronic device account which it later associates with all postage fees for mailings that bear the corresponding device identifier. The accounting with the customer can be conducted temporally decoupled from the billing. The bank account of the sender is advantageously correspondingly charged at the end of each accounting period with the accrued costs of an electronic device account.
The central postage accounting enables franking solutions at the sender that can function securely offline and without a security module. However, the mailings must carry a falsification-safe identifier of the sender or the sender's franking device so that the postage costs can be correctly associated with the originating senders. This is achieved by a symmetric encryption of parameters and with a key that changes with every franking imprint and which can be kept synchronous in the carrier data center without a communication between the franking device and the carrier data center being required with every franking. Rather, an initial initialization of the franking device is sufficient.
A secret first franking image key is thereby transmitted encrypted from the franking device to the mail carrier data center via the operator data center. The first franking image key can be encrypted in the franking device by means of a private communication key and decrypted in the operator data center by means of a public communication key. The secret first franking image key can be transmitted on encrypted to the mail carrier data center in essentially the same manner. The latter therefore possesses a currently valid first franking image verification key which is stored associated with the sender or his device identifier. A marking on a mail piece or a franking image contains at least one device identifier of the franking device, one key generation number and an integrity check code. The latter allows a check of the integrity of such parameters as device identifier and key generation number because the latter are encrypted by means of the currently valid first franking image key for the integrity check code. The device identifier of the franking device, the key generation number and the first franking image key are transmitted to the data center of the mail carrier during the initialization of the franking device.
After a franking, a currently valid second franking image key is generated in the franking device from the first or, respectively, previously valid franking image key, which second franking image key corresponds to a currently valid second franking image verification key that is, however, generated on the mail carrier side. The local key generation number in a franking device and its local copy on the mail carrier side are kept in sync in order to be able to derive the currently valid franking image verification key at the mail carrier from the previous valid franking image verification key.
Every device identifier is uniquely associated with a customer account to which the spent postage fees are billed at the end of every accounting period. After every franking, the key generation number in the franking device is changed, wherein a step-by-step alteration of the key generation number by an established numerical value ensues. For example, the key generation number is increased by one. A next valid cryptographic key is then derived from the current valid cryptographic key according to a first algorithm.
The franking image is equipped with an electronic module for secure administration of a postal identity and, for better differentiation from the conventional franking machines, is subsequently called a Postal Identity Management Device (PIMD).
Advantageously, pre-paid electronic money or electronic credit must no longer be loaded into the franking devices. There is therefore no possibility to manipulate pre-paid electronic money quantities. There is also no possibility to defraud the mail carrier by copying imprints. There is no inducement at all for a sender to manipulate his own franking device. Therefore, from the viewpoint of the mail carrier there is also no need to protect franking devices from intrusions of their users, which is why there is also no need for a hardware security module in franking devices. There is just as little need to establish an online connection before or during the franking except in an initialization of the PIMD.
However, in principle there is the possibility for each sender to use an invalid or incorrect device identifier (device ID). If a sender manages to misappropriate a foreign device identifier, the sender could send mail at the cost of the misappropriated device identifier.
However, invalid device identities are in principle recognizable by the mail sorting center when they are evaluated online, i.e. in the mail sorting. In principle, merely incorrect device identifiers cannot be detected by the mail sorting center since the true identity of the sender is not known. Although this could be detected via a biometric detection of the consigner at the mail box, the franking device would then not be simply designed. The use of incorrect device identifiers is therefore not detectable without additional measures in the consignment process, and consequently the potential for fraud here is relatively large. However, a fraudulent manipulation of the device identifier can be made significantly more difficult by a combination of the following measures:
Since the first key generation number is transmitted together with the first franking image key and the device identifier to a data center of the mail carrier, a remote scanning and evaluation of franking images to be checked (which franking images have been applied to the mail pieces by the franking device) can ensue there.
An integrity verification code is generated according to a second crypto-algorithm by means of the secret cryptographic franking image key of the franking device of the sender, the device identifier of the franking device and the current key generation number, wherein the franking image contains (in scannable form) at least the device identifier of the franking device, the current key generation number and the integrity verification code.
In the data center, a derivation of the franking image verification key that corresponds to the next secret franking image key can ensue according to a first crypto-algorithm from the first franking image key and from the current key generation number (scannable in the franking image) transmitted by every further mail piece if, for every franking image, a new franking image key was derived from a predecessor of the franking image key according to the same first crypto-algorithm.
An evaluation of the scanned data by means of a verification process in the data center of the mail carrier includes a determination of the mathematical relationship of the scanned key generation numbers to the copy of the last used key generation number. The value of the variation relative to the copy of the last used key generation number results from the product of every single step value with the number of variations. Given a step-by-step variation of the key generation number by an established numerical value in preparation of a subsequent franking image key, the aforementioned mathematical relationship results from the number of variations. A franking image verification key is calculated according to the first crypto-algorithm, wherein the first crypto-algorithm is applied as often as is predetermined by the mathematical relationship. The mail piece subjected to a winnowing and the scanned data are subjected to an error correction if a step-by-step variation of the key generation number by an established numerical value does not lead to the expected result, i.e. if the mathematical relationship does not correspond to the predetermined mathematical relationship. For example, this is case when the established mathematical relationship does not result from the number of variations. If a synchronization between the franking device and the data center (i.e. both between the scanned key generation number and its calculated copy and between the secret cryptographic franking image key and the calculated franking image verification key) is established in the aforementioned manner, a comparison integrity verification code can be calculated in the data center in order to cryptographically verify the scanned integrity verification code. A central postage accounting is implemented in the data center of the mail carrier when the authenticity of the integrity verification code demonstrably exists.
A mail transport system with central postage accounting includes a mail sorting center and data center of a mail carrier, a data center of an operator and a plurality of franking devices. The mail carrier transports the mail pieces franked by the franking device to the mail sorting center in a typical manner. Each franking device is engaged in a communication connection via a network and, if necessary, is in contact via a communication connection with the operator data center that registers the device identifier with its user and offers additional services. Each franking device can print franking imprints on letters and envelopes for mail pieces that are subsequently committed to the mail sorting center for further mail transport, which mail sorting center is connected in communication with the data center of the mail carrier. The data center of the mail sorting center is connected via a communication connection with the network and can likewise communicate with the operator data center as, conversely, the operator data center can communicate with the mail sorting center data center. As a result of an initialization of a franking device, information can thus arrive from the franking device via the operator data center to the data center of the mail carrier although the franking device enters into no direct communication with the data center of the mail carrier. With the aforementioned information, the data center of the mail carrier is able to evaluate information of the franking image, in particular to read and associate the device identifier with a sender and to invoice the postage fees for mail pieces of the same sender to a separate account, or for error correction.
The franking device can contain a key generator that generates a new franking image key for every next franking image.
Furthermore, a communication unit is provided in order to establish synchronization between franking device and data center as needed via the communication connection.
A scanner in the mail sorting center and a first means for evaluation in the data center of a mail carrier are provided that are in communication with one another, wherein the sender of the mail piece is determined via an association of the device identifier with a sender (which is stored in a database) via the first evaluation means, and the postage fee is determined via postage calculation means.
The evaluation unit in the data center includes a second means for security verification of every scanned franking image. The evaluation unit calculates a comparison integrity check code in the data center in order to cryptographically verify the scanned integrity check code if synchronization can be established between the scanned key generation number and its calculated copy and between the secret cryptographic franking image key and the calculated franking image verification key.
A unit to invoice the postage fees for mail pieces of the same sender to a separate account and a unit for error correction is provided in the data center of the mail carrier wherein the central postage accounting is implemented when the authenticity of the integrity check code demonstrably exists.
The second means for security verification are programmed to make a determination of the mathematical relationship of the scanned key generation number to the copy of the last used key generation number, wherein a franking image verification key that corresponds to the current subsequent franking image key of the franking device, generated according to the first crypto-algorithm. The latter is applied z-times corresponding to the determined mathematical relationship, and the franking image verification key is used together with the copy of the currently used key generation number and with the device identifier to form a comparison integrity check code according to the second crypto-algorithm.
The invention has the following advantages compared to the prior art:
A franking system with different variants of communication connections between an operator data center and franking devices is shown in
Each PIMD is connected via the network 18 with the operator data center 14. To secure the communication connection, a symmetric or asymmetric encryption can be used. For example, a secret first key is transmitted encrypted from the franking device via the operator data center 14 to the mail carrier data center 7. The secret first key can be encrypted in the franking device by means of a private key and be decrypted in the operator data center by means of a public key. For example, the operator data center 14 can likewise communicate with the mail carrier data center 7 via network 18 over a connection secured by encryption or via a dedicated line (not shown). One or more different techniques can thereby be used. Some connection variants are shown in
The fundamental mode of operation of the system is divided into the method steps:
In order to produce a franking, the sender determines the required postage in a known manner and starts the franking with his PIMD. The PIMD can contain an integrated scale and/or a postage calculator. The PIMD optionally prints plain text information such as the required postage value, the current date and possibly information for the mailing (product designation etc.).
The PIMD moreover prints a marking (for example a machine-readable barcode) that contains the following information.
This code M is calculated with the use of an algorithm for a message authentication code (MAC) via the data designated above (Henk C. A. van Tilborg: Encyclopedia of Cryptography and Security; Springer-Verlag New York, 2005, pages 361-367).
A hash-based message authentication code (HMAC) is advantageously used (ibid., pages 14 and 267). A secret cryptographic key of the sender is advantageously used according to the following formula (1) for HMAC formation:
M←HMAC(IDAKeyi ,f(g,i,IDAKeyi)). (1)
F is hereby a function with the parameters g, i and IDAKeyi. The function f advantageously delivers as a result the string g∥i consisting of the bit-by-bit serial printing of the parameters g and i:
M←HMAC(IDAKeyi ,g∥i). (2)
Given initialization of a franking device, its key generation number is set to one and an initial cryptographic (first) key IDAKey1 is generated. During the subsequent registration of the franking device, the franking device identifier g, the first key generation number i=1 and the associated first cryptographic key IDAKey1 are transmitted to the mail carrier. In this way the mail carrier receives the same secret cryptographic key that the franking device uses.
The key generation numbers and cryptographic keys received by the mail carriers and administered as a result are designed in the following with j or, respectively, IDAKeyj. The goal is to keep the local generation number i in a franking device and its local copy j on the mail carrier side in sync. How this goal is achieved is explained in more detail using the subsequently covered method steps of verification of franking imprints and error correction.
After every franking, the key generation number i in the PIMD is increased by one and a new cryptographic key IDAKeyi+1 is derived from the current key IDAKeyi according to formula (3):
IDAKeyi+1←hash (i,IDAKeyi) (3)
The formation of a hash value according to a hash function also proceeds from, among other things, Henk C. A. van Tilborg: Encyclopedia of Cryptography and Security; Springer-Verlag New York, 2005, pages 256-264).
The key generation number i and the cryptographic key IDAKeyi are used for the i-th franking after initialization of the franking device. In this way it is ensured that every cryptographic key is used for at most one franking.
Verification of Frankings
The franked mailings are supplied to the desired mail carrier, as is known. The mail carrier sorts the mailings, automatically reads the franking imprints (including the contained barcodes), subsequently transports the mailings to the destination address and delivers them there. The present invention assumes that all mailings are read before sorting and their barcodes can be nearly 100% recognized and correctly decoded.
Upon reading the mailings, the plain text information is evaluated and used to determine the postage value. In one embodiment, the postage value can simply be read off. In a second embodiment, the printed postage value can be checked by random sampling. In a third embodiment, the postage value is not printed and read at all but rather is directly determined in the mail sorting center from the physical parameters (length, width, thickness, weight, additional services) of the mailing.
Furthermore, upon reading the content of the barcode is determined, evaluated and checked as follows:
(I) First, it is checked by means of a first verification step whether the franking device identifier g is known in the database of the data center. If the verification is successful, the mail carrier determines from its database the local copy j on its own end for the last read key generation number i and the associated franking image verification key IDAKeyj.
(II) Subsequently, by means of a second verification step it is checked whether the local copy J of the current read key generation number i+x is greater than, or whether i−x is smaller than the last local copy j of the key generation number i that is stored as the last from this franking device with the same device identifier g. If this check is successful, the current franking image key IDAKeyJ is calculated. In the general case, J=j+x applies for rising or J=j−x applies for falling key generation numbers. Due to a constant increment value h and the number z of the steps, the value x of the variation of the key generation number results overall according to formula (4) as:
Given an increment value h=1 and the number z=1 of steps (i.e. in the preferred normal case J=j+1), the current key is calculated according to the following formula (4):
IDAKeyJ←hash (j,IDAKeyj). (5)
Alternatively, the verification does not always have to be successful given an occurrence of scanning or reading errors. The appertaining mail piece is rejected. The next following mail piece of the same sender exhibits a larger change in the current read key generation number because the number z of the steps has increased with the interval value h=1. The above calculation rule is consequently adapted, and (J−j) 1/h=z is recursively applied in the data center. In the preferred normal case (h=1), the aforementioned next following mail piece of the same sender has a franking image with a current read key generation number i+2 and a current franking image key IDAKeyi+2. The value of the local copy j consequently must be changed corresponding to the value x of the variation (i.e. by x=2), and the formula (5) must be applied again together with the last calculated franking image verification key for the rejected mail piece in order to be able to derive a current franking image key.
(III) In a third verification step, the read integrity check code M is subsequently cryptographically verified by checking the following equation:
M=HMAC(IDAKeyJ ,f(g,J,IDAKeyJ)). (6)
Wherein f ( . . . ) a function with the parameters g, J and IDAKeyJ.
The function f ( . . . ), which advantageously is a combination of the parameters g, J into one (alphanumerical) number, is encrypted with the secret franking image key IDAKeyJ in order to generate a numerical value as a basis for the HMAC formation. If it is advantageously processed according to formula (2), for the security verification it is also provided in a simplified manner that it is checked according to equation (7) in order to cryptographically verify the integrity check code M:
If this check is also successful, the determined postage amount is added to the electronic device account that the mail carrier directs to the data center of the mail sorting center for this device. All fees accrued in this device account are charged to the appertaining customer account at the end of the accounting period.
Error Management with Error Correction
If the verification by means of the first verification step (I) fails, an invalid sender identifier was apparently used. Transmission errors would already have been compensated via the error correction of the employed barcode. It is up to the respective mail carrier to define an error management for this case. Management possibilities are:
If the verification by means of the second verification step (II) fails, either a replay offense exists or the controller of the PIMD is malfunctioning. In each case, the mail carrier prints the last stored key generation number of the appertaining franking device on the mailing and returns this to the operator of the registered franking device. Additionally, the operator of the registered franking device should be notified electronically (e-mail, SMS) about the return so that the operator in the meantime does not frank additional mailings with incorrect key generation numbers.
If the verification by means of the third verification step (III) fails, a fatal error exists since the cryptographic keys would have to coincide as well if the key generation number i of the generating PIMD and its copy j in the checking mail sorting center coincide (i.e. check (II) was successful). In this error case a new initialization and registration of the PIMD must be arranged.
A new initialization can preferably occur in that the data center 7 of the mail carrier generates a new franking image key IDAKey*j and determines a difference value A according to the following (8):
Δ←IDAKey1 XOR IDAKey*j (8)
(XOR designates the Boolean operation of the per-bit exclusive-OR). The difference value Δ is subsequently printed on the return mailing that is sent back to the sender of the mail piece. The difference value Δ is additionally transmitted electronically to the data center 14 of the operator of the registered franking device. Since the first franking image key is known to the operator data center and is logically linked by an exclusive-OR function with the new franking image key, the new franking image key IDAKey*j can be determined. The new franking image key can now be sent or, respectively, transmitted to the appertaining PIMD in the manner of secure communication. The steps required in the PIMD initialization can be applied with corresponding modification so that the PIMD adopts the new franking image key.
Alternatively, OCR fonts could also be used in order to print and read the device identifiers.
The amount of information required for an authenticated device identifier significantly depends on the number of possible senders. Given 4 bytes that are required for a checksum and a number of x million possible senders, at least a number of #l=log256(x·106)+4=log256(x)+6·log256(10)+4≈log256(x)+6.5 bytes are required for the encoding of a device identifier. A postal market of up to 17 million senders therefore requires device identifiers 7 bytes in length, a market of up to 4 billion senders requires 8 bytes in length and a market of up to 1.09 trillion senders requires 9 bytes in length. Overall, 1.6 million franking machines are presently in existence in the US market. A 7-byte device identifier appears to be sufficient here.
If the franked mail pieces pass through the corresponding sorting systems of the postal mail sorting centers, the imprints are read and the printed postage, the device identifier and additional information are registered, checked and evaluated in a data center of the postal mail sorting center. The postal service performed for each sender is billed to him using this evaluation.
The fundamental mode of operation in the mail sorting center of the postal carrier assumes: a commission of the mail piece in the mail sorting center in a second Step 2; a scanning and evaluation of a marking and/or franking image in a third Step 3; the further transport of the mail piece in the fourth Step 4; and its delivery in the fifth Step 5; or its rejection in the fourth Step 4. The information from the scanned marking and/or the franking image is processed further in the data center of the mail sorting center in an evaluation routine 300 for its evaluation. The evaluation in Routine 300 includes at least the following steps:
A scanner in the mail sorting center and a first evaluation means in the data center of a mail carrier are provided that are communicatively connected with one another in order to implement a decoding and error correction of the information after scanning in Step 301, a determination of the respective sender in Step 302 and a determination of the postage fee in Step 303. The first evaluation means comprises a database that is coupled with a server.
Alternatively, the order of Steps 302 and 303 can be exchanged, or the two steps can be executed in parallel.
It is provided that
Second means (advantageously a server that is secured against misuse) for security verification of each scanned franking image are provided in the data center.
After a pass through Steps 301 through 304, a query ensues as to a verification of the franking device identifier g. If a verification is possible after a pass through Steps 301 through 304, a billing of the postage fee in the framework of the central postage accounting then ensues in Step 306 to the account of the sender determined in Step 302. However, if no verification is possible after a pass through Steps 301 through 304, this is established in the query step 305 and the workflow branches to Step 307 for error management. The verification of frankings and the three verification steps were already explained above. In the framework of the error management, a deviation signal is generated in order to prevent the further transport of the mail piece in the fourth Step 4 and in order to initiate the sorting out of the mail piece instead. The mail piece is transported to the recipient if the addressee (recipient) of the mail piece has been notified and has agreed to a delivery. The mail piece can be transported back to the sender when the sender of the mail piece has been notified and has agreed to a return. Otherwise, an undeliverable mail piece is destroyed. In the framework of the delivery to the addressee (recipient) of the mail piece, a billing likewise ensues, but to the recipient name.
Additional investigations and even a registration of undeliverable mail pieces can ensue in the framework of the error management.
A block diagram 100 of a franking device (PIMD) is shown in
The cryptographically encrypted driver 106 writes data in encrypted form into the non-volatile memory 103 (for example flash), for which it uses a permanent programmed key of a symmetric block cipher. If these data should subsequently be read out again, the driver first decrypts the data with the same permanent programmed key.
The program code to control the franking device advantageously exists in a program memory 105 (NV memory)—for example in a flash memory—but can also alternatively exist in an EPROM module. The later variant is inexpensive but not as flexible because an exchange of the operator program requires an exchange of the EPROM module. The communication within the franking device runs via an internal bus 110 and is controlled by the memory management unit 117 (MMU) upon storage of data. The volatile memory 107 is provided as a working memory.
The communication interface 109 can be connected via a (shown) internal or external modem with an operator data center or with another suitable communication device for data exchange. The communication connections, the communication network and the communication devices at the ends of the communication connections form the communication means in a known manner.
The aforementioned means 103 through 107 form a key generation means that generates a new franking image key via calculation for every new franking image. The immediately preceding franking image key thereby forms the basis. The latter and a communication key are both stored in the non-volatile memory 103. The calculation is implemented using a first and second crypto-algorithm before the franking, wherein a first integrity check code based on the second crypto-algorithm is generated for a first franking image, wherein for every subsequently franking image a subsequent franking image key is derived from a predecessor of the franking image key according to the first crypto-algorithm and an integrity check code is generated based on the subsequent franking image key, a key generation number, a device identifier of the franking device and the second crypto-algorithm.
A PIMD 10 can communicate securely with its operator data center 14, for which a communication protocol authenticated in both directions and optionally encrypted is typically used. Typical methods are based on a protocol for key agreement (Henk C. A. van Tilborg: Encyclopedia of Cryptography and Security; Springer-Verlag New York, 2005, 325) or key establishment.
A presentation of the levels of memory protection is shown in
After the second routine 202, a third routine 203 follows to encrypt keys COMKey and IDAKey by means of the internal encryption key IMDKey and an encrypted internal volatile storage of data in volatile memory 103, wherein the data contain the encrypted key. The third routine 203 thus leads to a volatile storage on an upper level of the memory protection.
The PIMD advantageously uses two keys or key pairs to secure its interactions with neighboring systems. A communication key COMKey is used for the electronic communication with the operator data center. This can be a symmetric key. Alternatively, an asymmetric key pair can be used. In the case of an asymmetric key pair, we designate the private communication key as COMPrivKey and the public communication key as COMPubKey.
A secret franking image key IDAKey is used to form the integrity check code M for the franking imprints that are read and evaluated by the appertaining mail carrier in the mail carrier data center in the mail transport, wherein said integrity check code M is printed on the mail piece upon franking. This is advantageously a symmetric key.
Both keys COMKey and IDAKey or, respectively, COMPrivKey and IDAKey are stored in an encrypted internal memory region (for example in volatile memory 103) of the postal identity management system (PIMD) and are only decrypted as needed. After use, the plain text copies of both keys are immediately deleted and the corresponding memory regions are overwritten with random bit patterns so that the clear keys cannot be read by unauthorized parties.
An internal encryption key IMDKey for a symmetric block cipher (for example Advanced Encryption Standard (AES)) is used for the encryption of the secret communication key COMKey or the private communication key COMPrivKey and of the secret franking image key IDAKey. This internal encryption key (IMDKey) is not permanently stored in plain text but rather is respectively, algorithmically derived as needed from the password. Plain text copies of the internal encryption key IMDKey are temporarily stored in the volatile memory 102 (time controlled internal storage) and deleted there again as soon as their residence time (time-out) has expired without them being used.
A random bit string (salt) is generated for a new password (Henk C. A. van Tilborg: Encyclopedia of Cryptography and Security; Springer-Verlag New York, 2005, page 541). The random bit string is attached to the password selected by the user. The result is mapped to a hash value (for example SHA256) via a hash function (ibid., hash function, page 256-264) and the franking image key IDAKey is derived from this in that the hash value is either used directly or is subjected to a hash function. The pair composed of salt and hash value for a password are subsequently stored in the password file, indexed according to passwords (soft protected internal memory). In order to protect this memory against unauthorized reads, software obfuscation techniques are used that, for example, store a data set in multiple parts that are present at different addresses in the memory 101.
The main processes of the operation of a PIMD are:
Belonging to the sub-processes of the operation of a PIMD are:
Alternatively, variants of the password input other than by hand are possible, assuming that the franking device possesses a correspondingly matched interface. For example, the password input can ensue via chip card, which assumes that the franking device possesses a write/read unit for chip cards. A duplicate input of the passwords also does not need to occur when it can be established in another manner whether it is intended to replace a previous password with a new, current password.
A processing of the password via a known process (salt & hash process) which has already been indicated above in connection with
The franking image key IDAKey1 is a first key which is used to form an integrity check code M. The COMKey is a communication key for the electronic communication with the operator data center. An encryption of both keys COMKey and IDAKey1 ensues in Step 409 via application of the new encryption key IMDKeyk upon encryption according to any of the known encryption algorithms, for example according to the Advanced Encryption Standard (AES) algorithm according to formula (9):
AES(IMDKeyk,(COMKey,IDAKey1))→D k1 (9)
After the internal storage of the data Dk1 of the encryption key COMKey and IDAKey1 has occurred in Step 410, in the subsequent Step 411 the sub-process according to
The mode of operation of the initialization of a PIMD belongs among the main processes and ends with the transmission of the generated first franking image key IDAKey1 to the mail carrier via a secure communication protocol.
The mail carrier thereupon registers the new franking device with its device identifier g, its first key generation number i and the associated franking image key IDAKeyi which are used to form an integrity check code M. The first key generation number i advantageously has a value of one.
Otherwise, in the event that the validity check of the device ID was successful the workflow branches to a sixth step 506 to query new passwords. After inputting a new password in the fifth step 505, a query of the newly input password can ensue in the sixth step 506. For example, a new password can be input twice in the fifth step 505 given a manual input via keyboard of the franking device, and such a duplicate input of a new password can be inquired after in the sixth step 506. Alternatively, it can be established according to other criteria whether the input of a new password is intended.
The user can thus establish a new password in that he inputs it identically twice. The franking device can possibly detected in a different manner that a routine 500 to change the password should run. Alternatively, other variants of the password input than by hand are possible, which assumes that the franking device has a correspondingly matched interface. A misuse of the device identifier g of the sender franking device is made more difficult with the password input, or alternatively by means of RFID identification, magnetic card, chip card, mobile device (cell phone, PDA) which can be communicatively connected with the franking device via a personal network (Bluetooth, USB, etc.).
After the authentication of the device ID in the third step 503 and the query in the sixth step 506 were successful, a processing of the new password into a new hash value Hashk+1 according to what is known as the salt & hash process ensues in a seventh step 507, the aforementioned process is identical to the first routine 201 for processing of the data that was already explained using the presentation in
After the salt and hash process in the seventh step 507, the new password is stored in a password and key file in an eighth step 508 and the workflow navigates to a ninth step 509 to extract internally stored data Dk, wherein the data contain the encrypted key. The encrypted internal storage of the key in the volatile memory 103 already ensues in the form of data Dk before routine 500 in Step 410 (
AES(IMDKeyk+1,(COMKeyk ,IDAKeyk))→D k+1 (10)
In a twelfth step 512 following the eleventh step 511, an internal volatile storage of the new encrypted data Dk+1 in the volatile memory 103 ensues again. Moreover, as a result of the tenth step 510 a time-controlled, internal volatile storage of the new internal encryption key IMDKeyk+1 ensues in the volatile memory 102 in a thirteenth step 513. The changing of the password is completed in the fourteenth step 514.
If that is the case, a notification can then ensue (not shown, for example via display) which requires the user of the franking device to input the device ID and the password.
An input of the device ID and of the password subsequently ensues in a third step 603 before a sub-process of the operation of a PIMD for the purpose of an authentication of the device ID runs in a fourth step 604. If an authentication of the device ID is not possible, Step 605 is reached and a message is displayed that the authentication has failed.
Otherwise, when the query in the second step 602 returns that a new authentication of the device ID is unnecessary, or if the authentication of the device ID in the fourth step 604 was successful, the workflow branches to a sixth step 606. In the sixth step 606, the internally stored data Di encrypted in the volatile memory 103 are decrypted by means of the active IMDKeyi into the plain text keys. These are the secret franking image key IDAKeyi and the secret communication key COMKeyi or private communication key COMPubKeyi. A formation of an integrity check code M according to the aforementioned formulas (1) or (2) now ensues.
After inputting franking data and franking image data in a seventh step 607, a processing of the franking data and franking image data together with the integrity check code M ensues in an eighth step 608 in order to generate a unique franking imprint as a result of Routine 600. Following the eighth step 608, in a ninth step 609 the key generation number i for the franking following the current franking is increased by one. After the incrementing in the ninth step 609, a derivation of a next encryption key IMDKeyi, an encryption of the key IDAKeyi and ComKeyi by means of the active IMDKeyi, and an encrypted internal storage of the keys IDAKeyi and COMKeyi ensue in a subsequent tenth step 610. An overwriting of the clear keys and of the encryption key in the volatile memory 102 and 103 ensues in a further eleventh step 611. A notification of the integrity of the check code can be output with a twelfth step 612. The routine 600 for calculation of a franking imprint is complete with the thirteenth step 613.
Otherwise, the workflow branches to an eighth step 708 to derive an encryption key from the current hash value. The encryption key is internally stored with time control until the expiration of the storage of the IMDKeys ensues (Step 709). The tenth step 710 of the first sub-routine 700 is therefore also reached and the authentication is complete.
as well as a transmission of the data D1 of the franking image key IDAKey1 and additional parameters g and i (encrypted with a communication key COMKey) which have been linked with one another via a mathematical function F, wherein the mathematical function F is known to the data center of the mail carrier.
The data D1 are transferred to the data center of the mail carrier and received and decrypted there. The receipt of the franking image key IDAKey1 and additional parameters g and i is confirmed.
A receipt of the receipt confirmation of the communication partner ensues in an eighth step 808 of the second sub-routine 800. The clear keys COMKey and IDAKey1 are overwritten with random data in the subsequent ninth step 809 of the second sub-routine 800. The sub-process of the transmission of the first franking image key IDAKey1 is therefore completed in the tenth step 810 of the second sub-routine 800.
The first franking image key IDAKey1 advantageously travels indirectly to the data center 7 of the mail center via the data center 14 of the operator or, respectively, manufacturer of the franking device. The data center 7 of the mail carrier is alternatively the direct communication partner.
In the aforementioned calculation routine 600, a derivation of the next franking image key ensues in Step 610 after the formation of a check code M in Step 606 and after its processing in Step 608. The order can also be reversed in that a derivation of the next franking image key ensues first, and then a formation of a check code M and its processing are undertaken. Given the order of the steps, a corresponding order must naturally be selected in a verification of the franking data in the data centers so that a synchronicity is achieved again in the generation of new franking image keys after the scanning of the franking image or a marking of the mail piece.
The aforementioned password change routine 500 the query for a new password can ensue according to different criteria than were presented in the exemplary embodiment. The input of the new password itself can ensue in a different manner than was presented in the exemplary embodiment.
The aforementioned routines can be adapted to the different mail regulations for various countries and be reasonably applied.
Although mail pieces, letter envelopes and franking strips are mentioned herein, other forms of print goods should not be precluded. Rather, all mail pieces that can be provided with a franking image by franking devices should be included. The application of a franking image encompasses the application of a printed marking.
The application of a franking image is not limited to a printing of a mail piece; other forms of the application of at least one franking image or one marking also are encompassed.
Although modifications and changes may be suggested by those skilled in the art, it is the intention of the inventors to embody within the patent warranted hereon all changes and modifications as reasonably and properly come within the scope of his contribution to the art.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4873645||Dec 18, 1987||Oct 10, 1989||Pitney Bowes, Inc.||Secure postage dispensing system|
|US5612889||Oct 4, 1994||Mar 18, 1997||Pitney Bowes Inc.||Mail processing system with unique mailpiece authorization assigned in advance of mailpieces entering carrier service mail processing stream|
|US5982896 *||Dec 23, 1996||Nov 9, 1999||Pitney Bowes Inc.||System and method of verifying cryptographic postage evidencing using a fixed key set|
|US6041704 *||Dec 9, 1997||Mar 28, 2000||Francotyp-Postalia Ag & Co.||Method for operating a digitally printing postage meter to generate and check a security imprint|
|US6233565 *||Feb 13, 1998||May 15, 2001||Saranac Software, Inc.||Methods and apparatus for internet based financial transactions with evidence of payment|
|US6233568 *||Jun 29, 1998||May 15, 2001||E-Stamp Corporation||System and method for automatically providing shipping/transportation fees|
|US6456987||Feb 24, 1998||Sep 24, 2002||Francotyp-Postalia Ag & Co.||Personal computer-based mail processing system with security arrangement contained in the personal computer|
|US6775656||Mar 17, 2000||Aug 10, 2004||Francotyp-Postalia Ag & Co.||Method for automatic installation of franking devices and arrangement for the implementation of the method|
|US6801833||Sep 10, 2002||Oct 5, 2004||Pitney Bowes Inc.||Method for maintaining the integrity of a mailing using radio frequency identification tags|
|US6847951 *||Mar 30, 1999||Jan 25, 2005||Pitney Bowes Inc.||Method for certifying public keys used to sign postal indicia and indicia so signed|
|US6868407||Nov 2, 2000||Mar 15, 2005||Pitney Bowes Inc.||Postage security device having cryptographic keys with a variable key length|
|US6934839 *||Jun 30, 2000||Aug 23, 2005||Stamps.Com Inc.||Evidencing and verifying indicia of value using secret key cryptography|
|US6938016 *||Aug 8, 2000||Aug 30, 2005||Pitney Bowes Inc.||Digital coin-based postage meter|
|US6944770||May 17, 2001||Sep 13, 2005||Intelli-Mark Technologies, Inc.||Methods and systems for generating and validating value-bearing documents|
|US7069253||Sep 26, 2002||Jun 27, 2006||Neopost Inc.||Techniques for tracking mailpieces and accounting for postage payment|
|US7110576||Dec 30, 2002||Sep 19, 2006||Pitney Bowes Inc.||System and method for authenticating a mailpiece sender|
|US7219084||Jun 1, 2000||May 15, 2007||Francotyp-Postalia Ag & Co.||Method for processing postal matter and postal matter processing system|
|US7225166 *||Jan 31, 2003||May 29, 2007||Neopost Technologies||Remote authentication of two dimensional barcoded indicia|
|US7243842 *||Nov 22, 2004||Jul 17, 2007||Stamps.Com Inc.||Computer-based value-bearing item customization security|
|US7613639 *||Oct 17, 2000||Nov 3, 2009||Stamps.Com||Secure and recoverable database for on-line value-bearing item system|
|US20050209875||Mar 9, 2005||Sep 22, 2005||Francotyp-Postalia Ag & Co. Kg||Method and arrangement for server-controlled security management of services to be performed by an electronic system|
|US20060002550 *||May 25, 2004||Jan 5, 2006||Pitney Bowes Incorporated||Method and system for generation of cryptographic keys and the like|
|US20060069655 *||Sep 29, 2004||Mar 30, 2006||Pitney Bowes Incorporated||Mutual authentication system and method for protection of postal security devices and infrastructure|
|US20060190732 *||Jan 21, 2004||Aug 24, 2006||Deutsche Post Ag||Method of Verifying the Validity of Digital Franking Notes and Device for Carrying Out Said Method|
|DE3840041A1||Nov 26, 1988||Jun 7, 1990||Helmut Lembens||Arrangement for franking items to be posted|
|DE10023145A1||May 12, 2000||Nov 15, 2001||Francotyp Postalia Gmbh||Frankiermaschine und Verfahren zur Freigabe einer Frankiermaschine|
|EP0735719A2||Apr 1, 1996||Oct 2, 1996||Pitney Bowes Inc.||Method for providing secure boxes in a key management system|
|EP0735721A2||Apr 1, 1996||Oct 2, 1996||Pitney Bowes Inc.||Method for master key generation and registration|
|EP0862145A2||Feb 25, 1998||Sep 2, 1998||Neopost Limited||Security and authentication of postage indicia|
|GB2193468A||Title not available|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US9430188 *||Dec 30, 2009||Aug 30, 2016||Stmicroelectronics International N.V.||Method for protecting a cryptographic device against SPA, DPA and time attacks|
|US20100166177 *||Dec 30, 2009||Jul 1, 2010||Incard S.A.||Method for protecting a cryptographic device against spa, dpa and time attacks|
|U.S. Classification||705/62, 705/408, 705/60|
|Cooperative Classification||G07B2017/0058, G07B2017/00846, G07B2017/00169, G07B17/00733|
|Sep 26, 2008||AS||Assignment|
Owner name: FRANCOTYP-POSTALIA GMBH, GERMANY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLEUMER, GERRIT;REEL/FRAME:021592/0775
Effective date: 20080923
|Dec 8, 2008||AS||Assignment|
Owner name: FRANCOTYP-POSTALIA GMBH, GERMANY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLEUMER, GERRIT;REEL/FRAME:021935/0745
Effective date: 20080923
|Apr 16, 2015||FPAY||Fee payment|
Year of fee payment: 4